high match confidence
Sentence-level differences:
- Reworded sentence: "We use these technologies for internal and operational purposes, including data storage, processing, and transmissions, as well as in our interactions with customers and suppliers."
- Reworded sentence: "Our digital technologies and services, and those of our customers and suppliers, are subject to the risk of cybersecurity incidents and, given the nature of such incidents, some can remain undetected for a period of time despite efforts to detect and respond to them in a timely manner."
Current (2024):
We are increasingly dependent on digital technologies and services to conduct our business. We use these technologies for internal and operational purposes, including data storage, processing, and transmissions, as well as in our interactions with customers and suppliers.…
Read full text
We are increasingly dependent on digital technologies and services to conduct our business. We use these technologies for internal and operational purposes, including data storage, processing, and transmissions, as well as in our interactions with customers and suppliers. Examples of these digital technologies include analytics, automation, and cloud services. Our digital technologies and services, and those of our customers and suppliers, are subject to the risk of cybersecurity incidents and, given the nature of such incidents, some can remain undetected for a period of time despite efforts to detect and respond to them in a timely manner. We routinely monitor our systems for cybersecurity threats and have processes in place to detect and remediate vulnerabilities. Nevertheless, we have experienced occasional cybersecurity incidents and attempted breaches in the past, including attacks resulting from phishing emails and malware infections. We responded to and mitigated the impact of these attacks. Even if we successfully defend our own digital technologies and services, we also rely on our customers and suppliers, with whom we may share data and services, to protect their digital technologies and services from cybersecurity incidents. No unauthorized access to material financial, technical, or customer data occurred as a result of cybersecurity attacks against us and none of the attacks mentioned above had a material adverse effect on our business, operations, reputation, or consolidated results of operations or consolidated financial condition. If our systems, or our customers’ or suppliers’ systems, for protecting against cybersecurity incidents prove not to be sufficient, we could be adversely affected by, among other things: loss of or damage to intellectual property, proprietary or confidential information, or customer, supplier, or employee data; interruption of our business operations; and increased costs required to prevent, respond to, or mitigate cybersecurity incidents. These risks could harm our reputation and our relationships with our customers, employees, suppliers and other third parties, and may result in claims against us. In addition, laws and regulations governing cybersecurity incidents, data privacy, and the unauthorized disclosure of confidential or protected information pose increasingly complex compliance challenges, and failure to comply with these laws could result in penalties and legal liability. These risks could have a material adverse effect on our business, consolidated results of operations and consolidated financial condition.
View prior text (2023)
We are increasingly dependent on digital technologies and services to conduct our business. We use these technologies for internal and operational purposes, including data storage, processing, and transmissions, as well as in our interactions with our business associates, such as customers and suppliers. Examples of these digital technologies include analytics, automation, and cloud services. Our digital technologies and services, and those of our business associates, are subject to the risk of cyberattacks and, given the nature of such attacks, some incidents can remain undetected for a period of time despite efforts to detect and respond to them in a timely manner. We routinely monitor our systems for cyber threats and have processes in place to detect and remediate vulnerabilities. Nevertheless, we have experienced occasional cyberattacks and attempted breaches over the past year, including attacks resulting from phishing emails and malware infections. We responded to and mitigated the impact of these incidents. Even if we successfully defend our own digital technologies and services, we also rely on our business associates, with whom we may share data and services, to defend their digital technologies and services against attack. No known leakage of material financial, technical, or customer data occurred as a result of cyberattacks against us and none of the incidents mentioned above had a material adverse effect on our business, operations, reputation, or consolidated results of operations or consolidated financial condition. If our systems, or our business associates' systems, for protecting against cybersecurity risks prove not to be sufficient, we could be adversely affected by, among other things: loss of or damage to intellectual property, proprietary or confidential information, or customer, supplier, or employee data; interruption of our business operations; and increased costs required to prevent, respond to, or mitigate cybersecurity attacks. These risks could harm our reputation and our relationships with our business associates, customers, employees, and other third parties, and may result in claims against us. In addition, laws and regulations governing cybersecurity, data privacy, and the unauthorized disclosure of confidential or protected information pose increasingly complex compliance challenges, and failure to comply with these laws could result in penalties and legal liability. These risks could have a material adverse effect on our business, consolidated results of operations and consolidated financial condition.